@action-llama/action-llama 0.10.1 → 0.10.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (113) hide show
  1. package/dist/agents/execution-engine.d.ts.map +1 -1
  2. package/dist/agents/execution-engine.js +2 -15
  3. package/dist/agents/execution-engine.js.map +1 -1
  4. package/dist/agents/runner.d.ts.map +1 -1
  5. package/dist/agents/runner.js +2 -15
  6. package/dist/agents/runner.js.map +1 -1
  7. package/dist/cli/commands/cloud-iam.d.ts +17 -0
  8. package/dist/cli/commands/cloud-iam.d.ts.map +1 -0
  9. package/dist/cli/commands/cloud-iam.js +591 -0
  10. package/dist/cli/commands/cloud-iam.js.map +1 -0
  11. package/dist/cli/commands/cloud-setup-ecs.d.ts +9 -0
  12. package/dist/cli/commands/cloud-setup-ecs.d.ts.map +1 -0
  13. package/dist/cli/commands/cloud-setup-ecs.js +697 -0
  14. package/dist/cli/commands/cloud-setup-ecs.js.map +1 -0
  15. package/dist/cli/commands/cloud-setup.d.ts.map +1 -1
  16. package/dist/cli/commands/cloud-setup.js +2 -827
  17. package/dist/cli/commands/cloud-setup.js.map +1 -1
  18. package/dist/cli/commands/creds.d.ts.map +1 -1
  19. package/dist/cli/commands/creds.js +2 -4
  20. package/dist/cli/commands/creds.js.map +1 -1
  21. package/dist/cli/commands/doctor.d.ts +1 -3
  22. package/dist/cli/commands/doctor.d.ts.map +1 -1
  23. package/dist/cli/commands/doctor.js +60 -635
  24. package/dist/cli/commands/doctor.js.map +1 -1
  25. package/dist/cli/commands/kill.d.ts.map +1 -1
  26. package/dist/cli/commands/kill.js +11 -14
  27. package/dist/cli/commands/kill.js.map +1 -1
  28. package/dist/cli/commands/pause.d.ts.map +1 -1
  29. package/dist/cli/commands/pause.js +11 -14
  30. package/dist/cli/commands/pause.js.map +1 -1
  31. package/dist/cli/commands/resume.d.ts.map +1 -1
  32. package/dist/cli/commands/resume.js +11 -14
  33. package/dist/cli/commands/resume.js.map +1 -1
  34. package/dist/cli/main.js +34 -32
  35. package/dist/cli/main.js.map +1 -1
  36. package/dist/cli/with-command.d.ts +13 -0
  37. package/dist/cli/with-command.d.ts.map +1 -0
  38. package/dist/cli/with-command.js +45 -0
  39. package/dist/cli/with-command.js.map +1 -0
  40. package/dist/gateway/index.d.ts +1 -0
  41. package/dist/gateway/index.d.ts.map +1 -1
  42. package/dist/gateway/index.js +5 -2
  43. package/dist/gateway/index.js.map +1 -1
  44. package/dist/gateway/rate-limiter.d.ts +16 -0
  45. package/dist/gateway/rate-limiter.d.ts.map +1 -0
  46. package/dist/gateway/rate-limiter.js +38 -0
  47. package/dist/gateway/rate-limiter.js.map +1 -0
  48. package/dist/gateway/routes/dashboard.d.ts.map +1 -1
  49. package/dist/gateway/routes/dashboard.js +8 -0
  50. package/dist/gateway/routes/dashboard.js.map +1 -1
  51. package/dist/gateway/routes/locks.d.ts +3 -1
  52. package/dist/gateway/routes/locks.d.ts.map +1 -1
  53. package/dist/gateway/routes/locks.js +18 -13
  54. package/dist/gateway/routes/locks.js.map +1 -1
  55. package/dist/gateway/routes/webhooks.d.ts.map +1 -1
  56. package/dist/gateway/routes/webhooks.js +14 -0
  57. package/dist/gateway/routes/webhooks.js.map +1 -1
  58. package/dist/scheduler/index.d.ts +1 -2
  59. package/dist/scheduler/index.d.ts.map +1 -1
  60. package/dist/scheduler/index.js +22 -180
  61. package/dist/scheduler/index.js.map +1 -1
  62. package/dist/scheduler/runtime-factory.d.ts +24 -4
  63. package/dist/scheduler/runtime-factory.d.ts.map +1 -1
  64. package/dist/scheduler/runtime-factory.js +60 -64
  65. package/dist/scheduler/runtime-factory.js.map +1 -1
  66. package/dist/scheduler/webhook-setup.d.ts +11 -20
  67. package/dist/scheduler/webhook-setup.d.ts.map +1 -1
  68. package/dist/scheduler/webhook-setup.js +22 -68
  69. package/dist/scheduler/webhook-setup.js.map +1 -1
  70. package/dist/shared/config.d.ts +1 -0
  71. package/dist/shared/config.d.ts.map +1 -1
  72. package/dist/shared/config.js +13 -2
  73. package/dist/shared/config.js.map +1 -1
  74. package/dist/shared/credentials.d.ts.map +1 -1
  75. package/dist/shared/credentials.js +2 -1
  76. package/dist/shared/credentials.js.map +1 -1
  77. package/dist/shared/errors.d.ts +34 -0
  78. package/dist/shared/errors.d.ts.map +1 -0
  79. package/dist/shared/errors.js +47 -0
  80. package/dist/shared/errors.js.map +1 -0
  81. package/dist/shared/git.d.ts.map +1 -1
  82. package/dist/shared/git.js +3 -2
  83. package/dist/shared/git.js.map +1 -1
  84. package/dist/webhooks/providers/github.d.ts.map +1 -1
  85. package/dist/webhooks/providers/github.js +2 -21
  86. package/dist/webhooks/providers/github.js.map +1 -1
  87. package/dist/webhooks/providers/linear.d.ts.map +1 -1
  88. package/dist/webhooks/providers/linear.js +2 -21
  89. package/dist/webhooks/providers/linear.js.map +1 -1
  90. package/dist/webhooks/providers/sentry.d.ts.map +1 -1
  91. package/dist/webhooks/providers/sentry.js +2 -20
  92. package/dist/webhooks/providers/sentry.js.map +1 -1
  93. package/dist/webhooks/validation.d.ts +17 -0
  94. package/dist/webhooks/validation.d.ts.map +1 -0
  95. package/dist/webhooks/validation.js +37 -0
  96. package/dist/webhooks/validation.js.map +1 -0
  97. package/package.json +1 -1
  98. package/dist/scheduler/config-validator.d.ts +0 -18
  99. package/dist/scheduler/config-validator.d.ts.map +0 -1
  100. package/dist/scheduler/config-validator.js +0 -53
  101. package/dist/scheduler/config-validator.js.map +0 -1
  102. package/dist/scheduler/cron-manager.d.ts +0 -14
  103. package/dist/scheduler/cron-manager.d.ts.map +0 -1
  104. package/dist/scheduler/cron-manager.js +0 -75
  105. package/dist/scheduler/cron-manager.js.map +0 -1
  106. package/dist/scheduler/shutdown-handler.d.ts +0 -16
  107. package/dist/scheduler/shutdown-handler.d.ts.map +0 -1
  108. package/dist/scheduler/shutdown-handler.js +0 -44
  109. package/dist/scheduler/shutdown-handler.js.map +0 -1
  110. package/dist/scheduler/trigger-dispatcher.d.ts +0 -12
  111. package/dist/scheduler/trigger-dispatcher.d.ts.map +0 -1
  112. package/dist/scheduler/trigger-dispatcher.js +0 -46
  113. package/dist/scheduler/trigger-dispatcher.js.map +0 -1
@@ -0,0 +1,591 @@
1
+ /**
2
+ * Cloud IAM reconciliation for doctor and cloud-setup commands.
3
+ *
4
+ * Extracted from doctor.ts to keep the credential validation logic
5
+ * separate from cloud infrastructure provisioning.
6
+ */
7
+ import { execFileSync } from "child_process";
8
+ import { confirm } from "@inquirer/prompts";
9
+ import { STSClient, GetCallerIdentityCommand } from "@aws-sdk/client-sts";
10
+ import { IAMClient, CreateRoleCommand, PutRolePolicyCommand, PutUserPolicyCommand, GetRoleCommand } from "@aws-sdk/client-iam";
11
+ import { ECRClient, SetRepositoryPolicyCommand } from "@aws-sdk/client-ecr";
12
+ import { discoverAgents, loadAgentConfig, loadGlobalConfig } from "../../shared/config.js";
13
+ import { parseCredentialRef } from "../../shared/credentials.js";
14
+ import { AWS_CONSTANTS } from "../../shared/aws-constants.js";
15
+ import { ConfigError, CloudProviderError } from "../../shared/errors.js";
16
+ export async function reconcileCloudIam(projectPath, cloud) {
17
+ if (cloud.provider === "cloud-run") {
18
+ await reconcileGcp(projectPath, cloud);
19
+ }
20
+ else if (cloud.provider === "ecs") {
21
+ await reconcileAws(projectPath, cloud);
22
+ }
23
+ else {
24
+ throw new CloudProviderError(`Unknown cloud provider: "${cloud.provider}"`);
25
+ }
26
+ }
27
+ async function reconcileGcp(projectPath, cloud) {
28
+ const { gcpProject, secretPrefix: configPrefix } = cloud;
29
+ if (!gcpProject) {
30
+ throw new ConfigError("cloud.gcpProject is required in config.toml");
31
+ }
32
+ const secretPrefix = configPrefix || AWS_CONSTANTS.DEFAULT_SECRET_PREFIX;
33
+ // Verify gcloud is available and authenticated
34
+ try {
35
+ gcloud(["auth", "print-access-token"], gcpProject);
36
+ }
37
+ catch (err) {
38
+ throw new CloudProviderError("gcloud CLI is not authenticated. Run 'gcloud auth login' first.\n" +
39
+ `Original error: ${err.message}`);
40
+ }
41
+ const agents = discoverAgents(projectPath);
42
+ if (agents.length === 0) {
43
+ console.log("No agents found. Create agents first.");
44
+ return;
45
+ }
46
+ // Pre-flight: check if any secrets exist in GSM with this prefix
47
+ const preflight = listGsmSecretCount(gcpProject, secretPrefix);
48
+ if (preflight === 0) {
49
+ console.log(`\nWarning: No secrets found in GSM with prefix "${secretPrefix}".\n` +
50
+ `IAM bindings are created against existing secrets, so you should push credentials first.\n`);
51
+ const proceed = await confirm({
52
+ message: "Continue anyway? (Service accounts will be created but no secrets will be bound)",
53
+ default: false,
54
+ });
55
+ if (!proceed) {
56
+ console.log("Aborted. Push credentials first, then re-run.");
57
+ return;
58
+ }
59
+ }
60
+ console.log(`\nSetting up Cloud Run service accounts for ${agents.length} agent(s)...\n`);
61
+ for (const name of agents) {
62
+ const config = loadAgentConfig(projectPath, name);
63
+ const saName = AWS_CONSTANTS.serviceAccountName(name);
64
+ const saEmail = AWS_CONSTANTS.serviceAccountEmail(name, gcpProject);
65
+ console.log(` Agent: ${name}`);
66
+ console.log(` SA: ${saEmail}`);
67
+ // 1. Create service account (idempotent)
68
+ try {
69
+ gcloud([
70
+ "iam", "service-accounts", "create", saName,
71
+ "--display-name", `Action Llama agent: ${name}`,
72
+ "--project", gcpProject,
73
+ ], gcpProject);
74
+ console.log(` Created service account`);
75
+ }
76
+ catch (err) {
77
+ if (err.message?.includes("already exists")) {
78
+ console.log(` Service account already exists`);
79
+ }
80
+ else {
81
+ throw err;
82
+ }
83
+ }
84
+ // 2. Collect all secret names this agent needs
85
+ const credRefs = [...new Set(config.credentials)];
86
+ if (config.model.authType !== "pi_auth" && !credRefs.includes("anthropic_key:default")) {
87
+ credRefs.push("anthropic_key:default");
88
+ }
89
+ const secretNames = [];
90
+ for (const ref of credRefs) {
91
+ const { type, instance } = parseCredentialRef(ref);
92
+ const fields = listGsmFields(gcpProject, secretPrefix, type, instance);
93
+ for (const field of fields) {
94
+ secretNames.push(`${secretPrefix}--${type}--${instance}--${field}`);
95
+ }
96
+ }
97
+ // 3. Grant secretmanager.secretAccessor on each secret
98
+ let boundCount = 0;
99
+ for (const secretName of secretNames) {
100
+ try {
101
+ gcloud([
102
+ "secrets", "add-iam-policy-binding", secretName,
103
+ "--member", `serviceAccount:${saEmail}`,
104
+ "--role", "roles/secretmanager.secretAccessor",
105
+ "--project", gcpProject,
106
+ ], gcpProject);
107
+ boundCount++;
108
+ }
109
+ catch (err) {
110
+ if (err.message?.includes("already exists") || err.message?.includes("already has")) {
111
+ boundCount++;
112
+ }
113
+ else {
114
+ console.log(` Warning: failed to bind ${secretName}: ${err.message}`);
115
+ }
116
+ }
117
+ }
118
+ console.log(` Bound ${boundCount} secret(s)`);
119
+ // 4. Grant the SA permission to act as itself (for Cloud Run job execution)
120
+ try {
121
+ gcloud([
122
+ "iam", "service-accounts", "add-iam-policy-binding", saEmail,
123
+ "--member", `serviceAccount:${saEmail}`,
124
+ "--role", "roles/iam.serviceAccountUser",
125
+ "--project", gcpProject,
126
+ ], gcpProject);
127
+ }
128
+ catch {
129
+ // May already be bound
130
+ }
131
+ console.log("");
132
+ }
133
+ console.log("Done. Each agent now has an isolated service account with access to only its declared secrets.");
134
+ }
135
+ async function reconcileAws(projectPath, cloud) {
136
+ const { awsRegion, ecrRepository, awsSecretPrefix } = cloud;
137
+ if (!awsRegion) {
138
+ throw new ConfigError("cloud.awsRegion is required in config.toml");
139
+ }
140
+ if (!ecrRepository) {
141
+ throw new ConfigError("cloud.ecrRepository is required in config.toml");
142
+ }
143
+ const secretPrefix = awsSecretPrefix || AWS_CONSTANTS.DEFAULT_SECRET_PREFIX;
144
+ // Extract account ID from ECR repo URI
145
+ const accountMatch = ecrRepository.match(/^(\d+)\.dkr\.ecr\./);
146
+ if (!accountMatch) {
147
+ throw new ConfigError(`Cannot extract AWS account ID from cloud.ecrRepository: "${ecrRepository}". ` +
148
+ `Expected format: 123456789012.dkr.ecr.<region>.amazonaws.com/<repo>`);
149
+ }
150
+ const accountId = accountMatch[1];
151
+ // Verify AWS credentials are valid
152
+ const stsClient = new STSClient({ region: awsRegion });
153
+ try {
154
+ await stsClient.send(new GetCallerIdentityCommand({}));
155
+ }
156
+ catch (err) {
157
+ throw new CloudProviderError("AWS CLI is not authenticated. Run 'aws configure' or set AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY.\n" +
158
+ `Original error: ${err.message}`);
159
+ }
160
+ const agents = discoverAgents(projectPath);
161
+ if (agents.length === 0) {
162
+ console.log("No agents found. Create agents first.");
163
+ return;
164
+ }
165
+ // Trust policy for ECS tasks
166
+ const trustPolicy = JSON.stringify({
167
+ Version: "2012-10-17",
168
+ Statement: [{
169
+ Effect: "Allow",
170
+ Principal: { Service: "ecs-tasks.amazonaws.com" },
171
+ Action: "sts:AssumeRole",
172
+ }],
173
+ });
174
+ const iamClient = new IAMClient({ region: awsRegion });
175
+ // Ensure execution role has Secrets Manager access (ECS uses this role to inject secrets)
176
+ if (cloud.executionRoleArn) {
177
+ const executionRoleName = cloud.executionRoleArn.split("/").pop();
178
+ try {
179
+ await iamClient.send(new PutRolePolicyCommand({
180
+ RoleName: executionRoleName,
181
+ PolicyName: "ActionLlamaExecution",
182
+ PolicyDocument: JSON.stringify({
183
+ Version: "2012-10-17",
184
+ Statement: [
185
+ {
186
+ Effect: "Allow",
187
+ Action: "secretsmanager:GetSecretValue",
188
+ Resource: `arn:aws:secretsmanager:${awsRegion}:${accountId}:secret:${secretPrefix}/*`,
189
+ },
190
+ {
191
+ Effect: "Allow",
192
+ Action: "logs:CreateLogGroup",
193
+ Resource: `arn:aws:logs:${awsRegion}:${accountId}:log-group:${AWS_CONSTANTS.LOG_GROUP}*`,
194
+ },
195
+ ],
196
+ }),
197
+ }));
198
+ console.log(`Execution role (${executionRoleName}): Secrets Manager + CloudWatch policy applied`);
199
+ }
200
+ catch (err) {
201
+ throw new CloudProviderError(`Failed to attach ActionLlamaExecution policy to ${executionRoleName}: ${err.message}\n` +
202
+ `The execution role needs secretsmanager:GetSecretValue and logs:CreateLogGroup permissions.\n` +
203
+ `Either grant your IAM user iam:PutRolePolicy on this role, or attach the policy manually in the AWS Console.`);
204
+ }
205
+ }
206
+ // Ensure ECR repository policy grants Lambda pull access
207
+ await ensureLambdaEcrPolicy(awsRegion, ecrRepository);
208
+ console.log(`\nSetting up ECS task roles for ${agents.length} agent(s)...\n`);
209
+ for (const name of agents) {
210
+ const config = loadAgentConfig(projectPath, name);
211
+ const roleName = AWS_CONSTANTS.taskRoleName(name);
212
+ console.log(` Agent: ${name}`);
213
+ console.log(` Role: ${roleName}`);
214
+ // 1. Create IAM role (idempotent)
215
+ try {
216
+ await iamClient.send(new CreateRoleCommand({
217
+ RoleName: roleName,
218
+ AssumeRolePolicyDocument: trustPolicy,
219
+ }));
220
+ console.log(` Created IAM role`);
221
+ }
222
+ catch (err) {
223
+ if (err.name === "EntityAlreadyExistsException") {
224
+ console.log(` IAM role already exists`);
225
+ }
226
+ else {
227
+ throw err;
228
+ }
229
+ }
230
+ // 2. Collect secret ARNs this agent needs
231
+ const credRefs = [...new Set(config.credentials)];
232
+ if (config.model.authType !== "pi_auth" && !credRefs.includes("anthropic_key:default")) {
233
+ credRefs.push("anthropic_key:default");
234
+ }
235
+ const secretArns = [];
236
+ for (const ref of credRefs) {
237
+ const { type, instance } = parseCredentialRef(ref);
238
+ secretArns.push(`arn:aws:secretsmanager:${awsRegion}:${accountId}:secret:${secretPrefix}/${type}/${instance}/*`);
239
+ }
240
+ // 3. Put inline policy for Secrets Manager access
241
+ if (secretArns.length > 0) {
242
+ const policy = JSON.stringify({
243
+ Version: "2012-10-17",
244
+ Statement: [{
245
+ Effect: "Allow",
246
+ Action: "secretsmanager:GetSecretValue",
247
+ Resource: secretArns,
248
+ }],
249
+ });
250
+ try {
251
+ await iamClient.send(new PutRolePolicyCommand({
252
+ RoleName: roleName,
253
+ PolicyName: "SecretsAccess",
254
+ PolicyDocument: policy,
255
+ }));
256
+ console.log(` Bound ${secretArns.length} secret path(s)`);
257
+ }
258
+ catch (err) {
259
+ console.log(` Warning: failed to put policy: ${err.message}`);
260
+ }
261
+ }
262
+ else {
263
+ console.log(` No secrets to bind`);
264
+ }
265
+ console.log("");
266
+ }
267
+ // Grant iam:PassRole on ECS task roles + execution role to the calling identity
268
+ const taskRoleArns = agents.map((name) => `arn:aws:iam::${accountId}:role/${AWS_CONSTANTS.taskRoleName(name)}`);
269
+ if (cloud.executionRoleArn) {
270
+ taskRoleArns.push(cloud.executionRoleArn);
271
+ }
272
+ if (taskRoleArns.length > 0) {
273
+ await grantPassRole(awsRegion, iamClient, taskRoleArns, "ActionLlamaEcsPassRole");
274
+ }
275
+ console.log("Done. Each agent now has an isolated IAM task role with access to only its declared secrets.");
276
+ console.log(`\nTask roles follow the convention: al-{agentName}-task-role`);
277
+ console.log("The ECS runtime will use them automatically at launch time.");
278
+ }
279
+ // --- Helpers ---
280
+ /**
281
+ * Grant iam:PassRole on the given role ARNs to the calling IAM user.
282
+ * Required so the CLI can assign roles to ECS tasks and Lambda functions.
283
+ */
284
+ export async function grantPassRole(awsRegion, iamClient, roleArns, policyName) {
285
+ const stsClient = new STSClient({ region: awsRegion });
286
+ const identity = await stsClient.send(new GetCallerIdentityCommand({}));
287
+ const callerArn = identity.Arn;
288
+ // Extract user name from ARN (arn:aws:iam::ACCOUNT:user/USERNAME)
289
+ const userMatch = callerArn.match(/:user\/(.+)$/);
290
+ if (!userMatch) {
291
+ console.log(`\n Note: Caller ${callerArn} is not an IAM user — skipping iam:PassRole auto-grant.`);
292
+ console.log(` If you get PassRole errors, add this policy to your IAM identity:`);
293
+ console.log(JSON.stringify({
294
+ Version: "2012-10-17",
295
+ Statement: [{
296
+ Effect: "Allow",
297
+ Action: "iam:PassRole",
298
+ Resource: roleArns,
299
+ }],
300
+ }, null, 2));
301
+ return;
302
+ }
303
+ const userName = userMatch[1];
304
+ const policy = JSON.stringify({
305
+ Version: "2012-10-17",
306
+ Statement: [{
307
+ Effect: "Allow",
308
+ Action: "iam:PassRole",
309
+ Resource: roleArns,
310
+ }],
311
+ });
312
+ try {
313
+ await iamClient.send(new PutUserPolicyCommand({
314
+ UserName: userName,
315
+ PolicyName: policyName,
316
+ PolicyDocument: policy,
317
+ }));
318
+ console.log(` Granted iam:PassRole on ${roleArns.length} role(s) to user ${userName}`);
319
+ }
320
+ catch (err) {
321
+ console.log(` Warning: could not grant iam:PassRole to user ${userName}: ${err.message}`);
322
+ console.log(` You may need to manually add iam:PassRole permission for these roles:`);
323
+ for (const arn of roleArns) {
324
+ console.log(` - ${arn}`);
325
+ }
326
+ }
327
+ }
328
+ function gcloud(args, _project) {
329
+ return execFileSync("gcloud", args, {
330
+ encoding: "utf-8",
331
+ timeout: 30_000,
332
+ stdio: ["pipe", "pipe", "pipe"],
333
+ }).trim();
334
+ }
335
+ function listGsmSecretCount(gcpProject, prefix) {
336
+ try {
337
+ const output = gcloud([
338
+ "secrets", "list",
339
+ "--filter", `name:${prefix}--`,
340
+ "--format", "value(name)",
341
+ "--project", gcpProject,
342
+ ], gcpProject);
343
+ if (!output.trim())
344
+ return 0;
345
+ return output.trim().split("\n").length;
346
+ }
347
+ catch {
348
+ return 0;
349
+ }
350
+ }
351
+ function listGsmFields(gcpProject, prefix, type, instance) {
352
+ const filter = `name:${prefix}--${type}--${instance}--`;
353
+ try {
354
+ const output = gcloud([
355
+ "secrets", "list",
356
+ "--filter", filter,
357
+ "--format", "value(name)",
358
+ "--project", gcpProject,
359
+ ], gcpProject);
360
+ if (!output.trim())
361
+ return [];
362
+ const fields = [];
363
+ for (const line of output.split("\n")) {
364
+ const secretId = line.trim().split("/").pop();
365
+ const parts = secretId.split("--");
366
+ if (parts.length === 4 && parts[0] === prefix && parts[1] === type && parts[2] === instance) {
367
+ fields.push(parts[3]);
368
+ }
369
+ }
370
+ return fields;
371
+ }
372
+ catch {
373
+ return [];
374
+ }
375
+ }
376
+ export async function validateEcsRoles(projectPath, cloud) {
377
+ const { awsRegion } = cloud;
378
+ if (!awsRegion) {
379
+ throw new ConfigError("cloud.awsRegion is required for ECS validation");
380
+ }
381
+ const agents = discoverAgents(projectPath);
382
+ if (agents.length === 0)
383
+ return;
384
+ const iamClient = new IAMClient({ region: awsRegion });
385
+ const missing = [];
386
+ const hasIncorrectTrust = [];
387
+ for (const name of agents) {
388
+ const roleName = AWS_CONSTANTS.taskRoleName(name);
389
+ try {
390
+ const role = await iamClient.send(new GetRoleCommand({ RoleName: roleName }));
391
+ // Check if the role has the correct trust policy for ECS tasks
392
+ const trustPolicy = JSON.parse(decodeURIComponent(role.Role.AssumeRolePolicyDocument));
393
+ const hasEcsTrust = trustPolicy.Statement?.some((stmt) => stmt.Effect === "Allow" &&
394
+ stmt.Principal?.Service === "ecs-tasks.amazonaws.com" &&
395
+ (stmt.Action === "sts:AssumeRole" || stmt.Action?.includes("sts:AssumeRole")));
396
+ if (!hasEcsTrust) {
397
+ hasIncorrectTrust.push(roleName);
398
+ console.log(` [TRUST ISSUE] ${roleName} - missing ECS task trust policy`);
399
+ }
400
+ else {
401
+ console.log(` [ok] ${roleName}`);
402
+ }
403
+ }
404
+ catch (err) {
405
+ if (err.name === "NoSuchEntityException") {
406
+ missing.push(roleName);
407
+ console.log(` [MISSING] ${roleName}`);
408
+ }
409
+ else {
410
+ console.log(` [ERROR] ${roleName}: ${err.message}`);
411
+ }
412
+ }
413
+ }
414
+ if (missing.length > 0 || hasIncorrectTrust.length > 0) {
415
+ console.log(`\nFound IAM role issues that will cause ECS task failures:`);
416
+ if (missing.length > 0) {
417
+ console.log(`\n${missing.length} IAM task role(s) are missing:`);
418
+ missing.forEach(role => console.log(` - ${role}`));
419
+ console.log(`\nFix: Run 'al doctor -c' to create missing roles automatically.`);
420
+ }
421
+ if (hasIncorrectTrust.length > 0) {
422
+ console.log(`\n${hasIncorrectTrust.length} IAM role(s) have incorrect trust policies:`);
423
+ hasIncorrectTrust.forEach(role => console.log(` - ${role}`));
424
+ console.log(`\nFix: Update trust policy to allow ECS tasks to assume the role:`);
425
+ console.log(`For each role above, run:`);
426
+ console.log(` aws iam update-assume-role-policy --role-name ROLE_NAME --policy-document file://ecs-trust.json`);
427
+ }
428
+ console.log(`\nECS task trust policy (save as ecs-trust.json):`);
429
+ console.log(JSON.stringify({
430
+ Version: "2012-10-17",
431
+ Statement: [{
432
+ Effect: "Allow",
433
+ Principal: { Service: "ecs-tasks.amazonaws.com" },
434
+ Action: "sts:AssumeRole",
435
+ }],
436
+ }, null, 2));
437
+ console.log(`\nAlternatively, re-run the cloud setup to fix all issues:`);
438
+ console.log(` al cloud setup`);
439
+ // Throw error to prevent proceeding with invalid configuration
440
+ throw new CloudProviderError(`${missing.length + hasIncorrectTrust.length} IAM task role(s) have issues that will prevent ECS tasks from starting. Fix the roles above before proceeding.`);
441
+ }
442
+ else {
443
+ console.log(`All ${agents.length} IAM task role(s) exist and have correct trust policies.`);
444
+ }
445
+ }
446
+ async function ensureLambdaEcrPolicy(awsRegion, ecrRepoUri) {
447
+ const repoName = ecrRepoUri.split("/").pop();
448
+ if (!repoName)
449
+ return;
450
+ const ecrClient = new ECRClient({ region: awsRegion });
451
+ const policy = JSON.stringify({
452
+ Version: "2012-10-17",
453
+ Statement: [{
454
+ Sid: "LambdaECRImageRetrievalPolicy",
455
+ Effect: "Allow",
456
+ Principal: { Service: "lambda.amazonaws.com" },
457
+ Action: [
458
+ "ecr:BatchGetImage",
459
+ "ecr:GetDownloadUrlForLayer",
460
+ ],
461
+ }],
462
+ });
463
+ try {
464
+ await ecrClient.send(new SetRepositoryPolicyCommand({
465
+ repositoryName: repoName,
466
+ policyText: policy,
467
+ }));
468
+ console.log(`ECR repository policy: granted Lambda pull access`);
469
+ }
470
+ catch (err) {
471
+ console.log(`Warning: could not set ECR repository policy for Lambda: ${err.message}`);
472
+ }
473
+ }
474
+ export async function reconcileLambdaRoles(projectPath, cloud) {
475
+ const { awsRegion, ecrRepository, awsSecretPrefix } = cloud;
476
+ if (!awsRegion || !ecrRepository)
477
+ return;
478
+ const secretPrefix = awsSecretPrefix || AWS_CONSTANTS.DEFAULT_SECRET_PREFIX;
479
+ const accountMatch = ecrRepository.match(/^(\d+)\.dkr\.ecr\./);
480
+ if (!accountMatch)
481
+ return;
482
+ const accountId = accountMatch[1];
483
+ const globalConfig = loadGlobalConfig(projectPath);
484
+ const agents = discoverAgents(projectPath);
485
+ const iamClient = new IAMClient({ region: awsRegion });
486
+ // Trust policy for Lambda
487
+ const trustPolicy = JSON.stringify({
488
+ Version: "2012-10-17",
489
+ Statement: [{
490
+ Effect: "Allow",
491
+ Principal: { Service: "lambda.amazonaws.com" },
492
+ Action: "sts:AssumeRole",
493
+ }],
494
+ });
495
+ let created = 0;
496
+ for (const name of agents) {
497
+ const config = loadAgentConfig(projectPath, name);
498
+ const effectiveTimeout = config.timeout ?? globalConfig.local?.timeout ?? 900;
499
+ // Only create Lambda roles for agents that will route to Lambda
500
+ if (effectiveTimeout > AWS_CONSTANTS.LAMBDA_MAX_TIMEOUT)
501
+ continue;
502
+ const roleName = AWS_CONSTANTS.lambdaRoleName(name);
503
+ // Create role
504
+ try {
505
+ await iamClient.send(new CreateRoleCommand({
506
+ RoleName: roleName,
507
+ AssumeRolePolicyDocument: trustPolicy,
508
+ }));
509
+ console.log(` Created Lambda role: ${roleName}`);
510
+ created++;
511
+ }
512
+ catch (err) {
513
+ if (err.name === "EntityAlreadyExistsException") {
514
+ console.log(` [ok] ${roleName}`);
515
+ }
516
+ else {
517
+ console.log(` [ERROR] ${roleName}: ${err.message}`);
518
+ continue;
519
+ }
520
+ }
521
+ // Add secrets + ECR + logs policy
522
+ const credRefs = [...new Set(config.credentials)];
523
+ if (config.model.authType !== "pi_auth" && !credRefs.includes("anthropic_key:default")) {
524
+ credRefs.push("anthropic_key:default");
525
+ }
526
+ const secretArns = credRefs.map((ref) => {
527
+ const { type, instance } = parseCredentialRef(ref);
528
+ return `arn:aws:secretsmanager:${awsRegion}:${accountId}:secret:${secretPrefix}/${type}/${instance}/*`;
529
+ });
530
+ const policy = JSON.stringify({
531
+ Version: "2012-10-17",
532
+ Statement: [
533
+ {
534
+ Effect: "Allow",
535
+ Action: "secretsmanager:GetSecretValue",
536
+ Resource: secretArns,
537
+ },
538
+ {
539
+ Effect: "Allow",
540
+ Action: [
541
+ "logs:CreateLogGroup",
542
+ "logs:CreateLogStream",
543
+ "logs:PutLogEvents",
544
+ ],
545
+ Resource: `arn:aws:logs:${awsRegion}:${accountId}:*`,
546
+ },
547
+ {
548
+ Effect: "Allow",
549
+ Action: "ecr:GetAuthorizationToken",
550
+ Resource: "*",
551
+ },
552
+ {
553
+ Effect: "Allow",
554
+ Action: [
555
+ "ecr:BatchGetImage",
556
+ "ecr:GetDownloadUrlForLayer",
557
+ ],
558
+ Resource: `arn:aws:ecr:${awsRegion}:${accountId}:repository/*`,
559
+ },
560
+ ],
561
+ });
562
+ try {
563
+ await iamClient.send(new PutRolePolicyCommand({
564
+ RoleName: roleName,
565
+ PolicyName: "LambdaExecution",
566
+ PolicyDocument: policy,
567
+ }));
568
+ }
569
+ catch (err) {
570
+ console.log(` Warning: failed to put policy on ${roleName}: ${err.message}`);
571
+ }
572
+ }
573
+ if (created > 0) {
574
+ console.log(`Created ${created} Lambda execution role(s).`);
575
+ }
576
+ else {
577
+ console.log(`All Lambda roles up to date.`);
578
+ }
579
+ // Grant iam:PassRole on Lambda roles to the calling identity
580
+ const lambdaRoleArns = agents
581
+ .filter((name) => {
582
+ const config = loadAgentConfig(projectPath, name);
583
+ const effectiveTimeout = config.timeout ?? globalConfig.local?.timeout ?? 900;
584
+ return effectiveTimeout <= AWS_CONSTANTS.LAMBDA_MAX_TIMEOUT;
585
+ })
586
+ .map((name) => `arn:aws:iam::${accountId}:role/${AWS_CONSTANTS.lambdaRoleName(name)}`);
587
+ if (lambdaRoleArns.length > 0) {
588
+ await grantPassRole(awsRegion, iamClient, lambdaRoleArns, "ActionLlamaLambdaPassRole");
589
+ }
590
+ }
591
+ //# sourceMappingURL=cloud-iam.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cloud-iam.js","sourceRoot":"","sources":["../../../src/cli/commands/cloud-iam.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,OAAO,EAAE,YAAY,EAAE,MAAM,eAAe,CAAC;AAC7C,OAAO,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC;AAC5C,OAAO,EAAE,SAAS,EAAE,wBAAwB,EAAE,MAAM,qBAAqB,CAAC;AAC1E,OAAO,EAAE,SAAS,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,oBAAoB,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAC;AAC/H,OAAO,EAAE,SAAS,EAAE,0BAA0B,EAAE,MAAM,qBAAqB,CAAC;AAC5E,OAAO,EAAE,cAAc,EAAE,eAAe,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAE3F,OAAO,EAAE,kBAAkB,EAAE,MAAM,6BAA6B,CAAC;AACjE,OAAO,EAAE,aAAa,EAAE,MAAM,+BAA+B,CAAC;AAC9D,OAAO,EAAE,WAAW,EAAE,kBAAkB,EAAE,MAAM,wBAAwB,CAAC;AAEzE,MAAM,CAAC,KAAK,UAAU,iBAAiB,CAAC,WAAmB,EAAE,KAAkB;IAC7E,IAAI,KAAK,CAAC,QAAQ,KAAK,WAAW,EAAE,CAAC;QACnC,MAAM,YAAY,CAAC,WAAW,EAAE,KAAK,CAAC,CAAC;IACzC,CAAC;SAAM,IAAI,KAAK,CAAC,QAAQ,KAAK,KAAK,EAAE,CAAC;QACpC,MAAM,YAAY,CAAC,WAAW,EAAE,KAAK,CAAC,CAAC;IACzC,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,kBAAkB,CAAC,4BAA4B,KAAK,CAAC,QAAQ,GAAG,CAAC,CAAC;IAC9E,CAAC;AACH,CAAC;AAED,KAAK,UAAU,YAAY,CAAC,WAAmB,EAAE,KAAkB;IACjE,MAAM,EAAE,UAAU,EAAE,YAAY,EAAE,YAAY,EAAE,GAAG,KAAK,CAAC;IACzD,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,MAAM,IAAI,WAAW,CAAC,6CAA6C,CAAC,CAAC;IACvE,CAAC;IAED,MAAM,YAAY,GAAG,YAAY,IAAI,aAAa,CAAC,qBAAqB,CAAC;IAEzE,+CAA+C;IAC/C,IAAI,CAAC;QACH,MAAM,CAAC,CAAC,MAAM,EAAE,oBAAoB,CAAC,EAAE,UAAU,CAAC,CAAC;IACrD,CAAC;IAAC,OAAO,GAAQ,EAAE,CAAC;QAClB,MAAM,IAAI,kBAAkB,CAC1B,mEAAmE;YACnE,mBAAmB,GAAG,CAAC,OAAO,EAAE,CACjC,CAAC;IACJ,CAAC;IAED,MAAM,MAAM,GAAG,cAAc,CAAC,WAAW,CAAC,CAAC;IAC3C,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACxB,OAAO,CAAC,GAAG,CAAC,uCAAuC,CAAC,CAAC;QACrD,OAAO;IACT,CAAC;IAED,iEAAiE;IACjE,MAAM,SAAS,GAAG,kBAAkB,CAAC,UAAU,EAAE,YAAY,CAAC,CAAC;IAC/D,IAAI,SAAS,KAAK,CAAC,EAAE,CAAC;QACpB,OAAO,CAAC,GAAG,CACT,mDAAmD,YAAY,MAAM;YACrE,4FAA4F,CAC7F,CAAC;QACF,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC;YAC5B,OAAO,EAAE,kFAAkF;YAC3F,OAAO,EAAE,KAAK;SACf,CAAC,CAAC;QACH,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,+CAA+C,CAAC,CAAC;YAC7D,OAAO;QACT,CAAC;IACH,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,+CAA+C,MAAM,CAAC,MAAM,gBAAgB,CAAC,CAAC;IAE1F,KAAK,MAAM,IAAI,IAAI,MAAM,EAAE,CAAC;QAC1B,MAAM,MAAM,GAAG,eAAe,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAClD,MAAM,MAAM,GAAG,aAAa,CAAC,kBAAkB,CAAC,IAAI,CAAC,CAAC;QACtD,MAAM,OAAO,GAAG,aAAa,CAAC,mBAAmB,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAEpE,OAAO,CAAC,GAAG,CAAC,YAAY,IAAI,EAAE,CAAC,CAAC;QAChC,OAAO,CAAC,GAAG,CAAC,WAAW,OAAO,EAAE,CAAC,CAAC;QAElC,yCAAyC;QACzC,IAAI,CAAC;YACH,MAAM,CAAC;gBACL,KAAK,EAAE,kBAAkB,EAAE,QAAQ,EAAE,MAAM;gBAC3C,gBAAgB,EAAE,uBAAuB,IAAI,EAAE;gBAC/C,WAAW,EAAE,UAAU;aACxB,EAAE,UAAU,CAAC,CAAC;YACf,OAAO,CAAC,GAAG,CAAC,6BAA6B,CAAC,CAAC;QAC7C,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,IAAI,GAAG,CAAC,OAAO,EAAE,QAAQ,CAAC,gBAAgB,CAAC,EAAE,CAAC;gBAC5C,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAC;YACpD,CAAC;iBAAM,CAAC;gBACN,MAAM,GAAG,CAAC;YACZ,CAAC;QACH,CAAC;QAED,+CAA+C;QAC/C,MAAM,QAAQ,GAAG,CAAC,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,CAAC;QAClD,IAAI,MAAM,CAAC,KAAK,CAAC,QAAQ,KAAK,SAAS,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,uBAAuB,CAAC,EAAE,CAAC;YACvF,QAAQ,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC;QACzC,CAAC;QAED,MAAM,WAAW,GAAa,EAAE,CAAC;QACjC,KAAK,MAAM,GAAG,IAAI,QAAQ,EAAE,CAAC;YAC3B,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;YACnD,MAAM,MAAM,GAAG,aAAa,CAAC,UAAU,EAAE,YAAY,EAAE,IAAI,EAAE,QAAQ,CAAC,CAAC;YACvE,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;gBAC3B,WAAW,CAAC,IAAI,CAAC,GAAG,YAAY,KAAK,IAAI,KAAK,QAAQ,KAAK,KAAK,EAAE,CAAC,CAAC;YACtE,CAAC;QACH,CAAC;QAED,uDAAuD;QACvD,IAAI,UAAU,GAAG,CAAC,CAAC;QACnB,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;YACrC,IAAI,CAAC;gBACH,MAAM,CAAC;oBACL,SAAS,EAAE,wBAAwB,EAAE,UAAU;oBAC/C,UAAU,EAAE,kBAAkB,OAAO,EAAE;oBACvC,QAAQ,EAAE,oCAAoC;oBAC9C,WAAW,EAAE,UAAU;iBACxB,EAAE,UAAU,CAAC,CAAC;gBACf,UAAU,EAAE,CAAC;YACf,CAAC;YAAC,OAAO,GAAQ,EAAE,CAAC;gBAClB,IAAI,GAAG,CAAC,OAAO,EAAE,QAAQ,CAAC,gBAAgB,CAAC,IAAI,GAAG,CAAC,OAAO,EAAE,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;oBACpF,UAAU,EAAE,CAAC;gBACf,CAAC;qBAAM,CAAC;oBACN,OAAO,CAAC,GAAG,CAAC,+BAA+B,UAAU,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBAC3E,CAAC;YACH,CAAC;QACH,CAAC;QACD,OAAO,CAAC,GAAG,CAAC,aAAa,UAAU,YAAY,CAAC,CAAC;QAEjD,4EAA4E;QAC5E,IAAI,CAAC;YACH,MAAM,CAAC;gBACL,KAAK,EAAE,kBAAkB,EAAE,wBAAwB,EAAE,OAAO;gBAC5D,UAAU,EAAE,kBAAkB,OAAO,EAAE;gBACvC,QAAQ,EAAE,8BAA8B;gBACxC,WAAW,EAAE,UAAU;aACxB,EAAE,UAAU,CAAC,CAAC;QACjB,CAAC;QAAC,MAAM,CAAC;YACP,uBAAuB;QACzB,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;IAClB,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,gGAAgG,CAAC,CAAC;AAChH,CAAC;AAED,KAAK,UAAU,YAAY,CAAC,WAAmB,EAAE,KAAkB;IACjE,MAAM,EAAE,SAAS,EAAE,aAAa,EAAE,eAAe,EAAE,GAAG,KAAK,CAAC;IAC5D,IAAI,CAAC,SAAS,EAAE,CAAC;QACf,MAAM,IAAI,WAAW,CAAC,4CAA4C,CAAC,CAAC;IACtE,CAAC;IACD,IAAI,CAAC,aAAa,EAAE,CAAC;QACnB,MAAM,IAAI,WAAW,CAAC,gDAAgD,CAAC,CAAC;IAC1E,CAAC;IAED,MAAM,YAAY,GAAG,eAAe,IAAI,aAAa,CAAC,qBAAqB,CAAC;IAE5E,uCAAuC;IACvC,MAAM,YAAY,GAAG,aAAa,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC;IAC/D,IAAI,CAAC,YAAY,EAAE,CAAC;QAClB,MAAM,IAAI,WAAW,CACnB,4DAA4D,aAAa,KAAK;YAC9E,qEAAqE,CACtE,CAAC;IACJ,CAAC;IACD,MAAM,SAAS,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;IAElC,mCAAmC;IACnC,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IACvD,IAAI,CAAC;QACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,wBAAwB,CAAC,EAAE,CAAC,CAAC,CAAC;IACzD,CAAC;IAAC,OAAO,GAAQ,EAAE,CAAC;QAClB,MAAM,IAAI,kBAAkB,CAC1B,qGAAqG;YACrG,mBAAmB,GAAG,CAAC,OAAO,EAAE,CACjC,CAAC;IACJ,CAAC;IAED,MAAM,MAAM,GAAG,cAAc,CAAC,WAAW,CAAC,CAAC;IAC3C,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACxB,OAAO,CAAC,GAAG,CAAC,uCAAuC,CAAC,CAAC;QACrD,OAAO;IACT,CAAC;IAED,6BAA6B;IAC7B,MAAM,WAAW,GAAG,IAAI,CAAC,SAAS,CAAC;QACjC,OAAO,EAAE,YAAY;QACrB,SAAS,EAAE,CAAC;gBACV,MAAM,EAAE,OAAO;gBACf,SAAS,EAAE,EAAE,OAAO,EAAE,yBAAyB,EAAE;gBACjD,MAAM,EAAE,gBAAgB;aACzB,CAAC;KACH,CAAC,CAAC;IAEH,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IAEvD,0FAA0F;IAC1F,IAAI,KAAK,CAAC,gBAAgB,EAAE,CAAC;QAC3B,MAAM,iBAAiB,GAAG,KAAK,CAAC,gBAAgB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAG,CAAC;QACnE,IAAI,CAAC;YACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,oBAAoB,CAAC;gBAC5C,QAAQ,EAAE,iBAAiB;gBAC3B,UAAU,EAAE,sBAAsB;gBAClC,cAAc,EAAE,IAAI,CAAC,SAAS,CAAC;oBAC7B,OAAO,EAAE,YAAY;oBACrB,SAAS,EAAE;wBACT;4BACE,MAAM,EAAE,OAAO;4BACf,MAAM,EAAE,+BAA+B;4BACvC,QAAQ,EAAE,0BAA0B,SAAS,IAAI,SAAS,WAAW,YAAY,IAAI;yBACtF;wBACD;4BACE,MAAM,EAAE,OAAO;4BACf,MAAM,EAAE,qBAAqB;4BAC7B,QAAQ,EAAE,gBAAgB,SAAS,IAAI,SAAS,cAAc,aAAa,CAAC,SAAS,GAAG;yBACzF;qBACF;iBACF,CAAC;aACH,CAAC,CAAC,CAAC;YACJ,OAAO,CAAC,GAAG,CAAC,mBAAmB,iBAAiB,gDAAgD,CAAC,CAAC;QACpG,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,IAAI,kBAAkB,CAC1B,mDAAmD,iBAAiB,KAAK,GAAG,CAAC,OAAO,IAAI;gBACxF,+FAA+F;gBAC/F,8GAA8G,CAC/G,CAAC;QACJ,CAAC;IACH,CAAC;IAED,yDAAyD;IACzD,MAAM,qBAAqB,CAAC,SAAS,EAAE,aAAa,CAAC,CAAC;IAEtD,OAAO,CAAC,GAAG,CAAC,mCAAmC,MAAM,CAAC,MAAM,gBAAgB,CAAC,CAAC;IAE9E,KAAK,MAAM,IAAI,IAAI,MAAM,EAAE,CAAC;QAC1B,MAAM,MAAM,GAAG,eAAe,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAClD,MAAM,QAAQ,GAAG,aAAa,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC;QAElD,OAAO,CAAC,GAAG,CAAC,YAAY,IAAI,EAAE,CAAC,CAAC;QAChC,OAAO,CAAC,GAAG,CAAC,aAAa,QAAQ,EAAE,CAAC,CAAC;QAErC,kCAAkC;QAClC,IAAI,CAAC;YACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,iBAAiB,CAAC;gBACzC,QAAQ,EAAE,QAAQ;gBAClB,wBAAwB,EAAE,WAAW;aACtC,CAAC,CAAC,CAAC;YACJ,OAAO,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAC;QACtC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,IAAI,GAAG,CAAC,IAAI,KAAK,8BAA8B,EAAE,CAAC;gBAChD,OAAO,CAAC,GAAG,CAAC,6BAA6B,CAAC,CAAC;YAC7C,CAAC;iBAAM,CAAC;gBACN,MAAM,GAAG,CAAC;YACZ,CAAC;QACH,CAAC;QAED,0CAA0C;QAC1C,MAAM,QAAQ,GAAG,CAAC,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,CAAC;QAClD,IAAI,MAAM,CAAC,KAAK,CAAC,QAAQ,KAAK,SAAS,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,uBAAuB,CAAC,EAAE,CAAC;YACvF,QAAQ,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC;QACzC,CAAC;QAED,MAAM,UAAU,GAAa,EAAE,CAAC;QAChC,KAAK,MAAM,GAAG,IAAI,QAAQ,EAAE,CAAC;YAC3B,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;YACnD,UAAU,CAAC,IAAI,CACb,0BAA0B,SAAS,IAAI,SAAS,WAAW,YAAY,IAAI,IAAI,IAAI,QAAQ,IAAI,CAChG,CAAC;QACJ,CAAC;QAED,kDAAkD;QAClD,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC1B,MAAM,MAAM,GAAG,IAAI,CAAC,SAAS,CAAC;gBAC5B,OAAO,EAAE,YAAY;gBACrB,SAAS,EAAE,CAAC;wBACV,MAAM,EAAE,OAAO;wBACf,MAAM,EAAE,+BAA+B;wBACvC,QAAQ,EAAE,UAAU;qBACrB,CAAC;aACH,CAAC,CAAC;YAEH,IAAI,CAAC;gBACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,oBAAoB,CAAC;oBAC5C,QAAQ,EAAE,QAAQ;oBAClB,UAAU,EAAE,eAAe;oBAC3B,cAAc,EAAE,MAAM;iBACvB,CAAC,CAAC,CAAC;gBACJ,OAAO,CAAC,GAAG,CAAC,aAAa,UAAU,CAAC,MAAM,iBAAiB,CAAC,CAAC;YAC/D,CAAC;YAAC,OAAO,GAAQ,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,sCAAsC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACnE,CAAC;QACH,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,GAAG,CAAC,wBAAwB,CAAC,CAAC;QACxC,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;IAClB,CAAC;IAED,gFAAgF;IAChF,MAAM,YAAY,GAAG,MAAM,CAAC,GAAG,CAC7B,CAAC,IAAI,EAAE,EAAE,CAAC,gBAAgB,SAAS,SAAS,aAAa,CAAC,YAAY,CAAC,IAAI,CAAC,EAAE,CAC/E,CAAC;IACF,IAAI,KAAK,CAAC,gBAAgB,EAAE,CAAC;QAC3B,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC;IAC5C,CAAC;IACD,IAAI,YAAY,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QAC5B,MAAM,aAAa,CAAC,SAAS,EAAE,SAAS,EAAE,YAAY,EAAE,wBAAwB,CAAC,CAAC;IACpF,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,8FAA8F,CAAC,CAAC;IAC5G,OAAO,CAAC,GAAG,CAAC,8DAA8D,CAAC,CAAC;IAC5E,OAAO,CAAC,GAAG,CAAC,6DAA6D,CAAC,CAAC;AAC7E,CAAC;AAED,kBAAkB;AAElB;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,aAAa,CACjC,SAAiB,EACjB,SAAoB,EACpB,QAAkB,EAClB,UAAkB;IAElB,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IACvD,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,wBAAwB,CAAC,EAAE,CAAC,CAAC,CAAC;IACxE,MAAM,SAAS,GAAG,QAAQ,CAAC,GAAI,CAAC;IAEhC,kEAAkE;IAClE,MAAM,SAAS,GAAG,SAAS,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC;IAClD,IAAI,CAAC,SAAS,EAAE,CAAC;QACf,OAAO,CAAC,GAAG,CAAC,oBAAoB,SAAS,yDAAyD,CAAC,CAAC;QACpG,OAAO,CAAC,GAAG,CAAC,qEAAqE,CAAC,CAAC;QACnF,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,SAAS,CAAC;YACzB,OAAO,EAAE,YAAY;YACrB,SAAS,EAAE,CAAC;oBACV,MAAM,EAAE,OAAO;oBACf,MAAM,EAAE,cAAc;oBACtB,QAAQ,EAAE,QAAQ;iBACnB,CAAC;SACH,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QACb,OAAO;IACT,CAAC;IAED,MAAM,QAAQ,GAAG,SAAS,CAAC,CAAC,CAAC,CAAC;IAC9B,MAAM,MAAM,GAAG,IAAI,CAAC,SAAS,CAAC;QAC5B,OAAO,EAAE,YAAY;QACrB,SAAS,EAAE,CAAC;gBACV,MAAM,EAAE,OAAO;gBACf,MAAM,EAAE,cAAc;gBACtB,QAAQ,EAAE,QAAQ;aACnB,CAAC;KACH,CAAC,CAAC;IAEH,IAAI,CAAC;QACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,oBAAoB,CAAC;YAC5C,QAAQ,EAAE,QAAQ;YAClB,UAAU,EAAE,UAAU;YACtB,cAAc,EAAE,MAAM;SACvB,CAAC,CAAC,CAAC;QACJ,OAAO,CAAC,GAAG,CAAC,6BAA6B,QAAQ,CAAC,MAAM,oBAAoB,QAAQ,EAAE,CAAC,CAAC;IAC1F,CAAC;IAAC,OAAO,GAAQ,EAAE,CAAC;QAClB,OAAO,CAAC,GAAG,CAAC,mDAAmD,QAAQ,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;QAC3F,OAAO,CAAC,GAAG,CAAC,yEAAyE,CAAC,CAAC;QACvF,KAAK,MAAM,GAAG,IAAI,QAAQ,EAAE,CAAC;YAC3B,OAAO,CAAC,GAAG,CAAC,SAAS,GAAG,EAAE,CAAC,CAAC;QAC9B,CAAC;IACH,CAAC;AACH,CAAC;AAED,SAAS,MAAM,CAAC,IAAc,EAAE,QAAgB;IAC9C,OAAO,YAAY,CAAC,QAAQ,EAAE,IAAI,EAAE;QAClC,QAAQ,EAAE,OAAO;QACjB,OAAO,EAAE,MAAM;QACf,KAAK,EAAE,CAAC,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC;KAChC,CAAC,CAAC,IAAI,EAAE,CAAC;AACZ,CAAC;AAED,SAAS,kBAAkB,CAAC,UAAkB,EAAE,MAAc;IAC5D,IAAI,CAAC;QACH,MAAM,MAAM,GAAG,MAAM,CAAC;YACpB,SAAS,EAAE,MAAM;YACjB,UAAU,EAAE,QAAQ,MAAM,IAAI;YAC9B,UAAU,EAAE,aAAa;YACzB,WAAW,EAAE,UAAU;SACxB,EAAE,UAAU,CAAC,CAAC;QACf,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE;YAAE,OAAO,CAAC,CAAC;QAC7B,OAAO,MAAM,CAAC,IAAI,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC;IAC1C,CAAC;IAAC,MAAM,CAAC;QACP,OAAO,CAAC,CAAC;IACX,CAAC;AACH,CAAC;AAED,SAAS,aAAa,CACpB,UAAkB,EAClB,MAAc,EACd,IAAY,EACZ,QAAgB;IAEhB,MAAM,MAAM,GAAG,QAAQ,MAAM,KAAK,IAAI,KAAK,QAAQ,IAAI,CAAC;IACxD,IAAI,CAAC;QACH,MAAM,MAAM,GAAG,MAAM,CAAC;YACpB,SAAS,EAAE,MAAM;YACjB,UAAU,EAAE,MAAM;YAClB,UAAU,EAAE,aAAa;YACzB,WAAW,EAAE,UAAU;SACxB,EAAE,UAAU,CAAC,CAAC;QAEf,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE;YAAE,OAAO,EAAE,CAAC;QAE9B,MAAM,MAAM,GAAa,EAAE,CAAC;QAC5B,KAAK,MAAM,IAAI,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC;YACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAG,CAAC;YAC/C,MAAM,KAAK,GAAG,QAAQ,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;YACnC,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,MAAM,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,IAAI,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,QAAQ,EAAE,CAAC;gBAC5F,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;YACxB,CAAC;QACH,CAAC;QACD,OAAO,MAAM,CAAC;IAChB,CAAC;IAAC,MAAM,CAAC;QACP,OAAO,EAAE,CAAC;IACZ,CAAC;AACH,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,gBAAgB,CAAC,WAAmB,EAAE,KAAkB;IAC5E,MAAM,EAAE,SAAS,EAAE,GAAG,KAAK,CAAC;IAC5B,IAAI,CAAC,SAAS,EAAE,CAAC;QACf,MAAM,IAAI,WAAW,CAAC,gDAAgD,CAAC,CAAC;IAC1E,CAAC;IAED,MAAM,MAAM,GAAG,cAAc,CAAC,WAAW,CAAC,CAAC;IAC3C,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC;QAAE,OAAO;IAEhC,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IACvD,MAAM,OAAO,GAAa,EAAE,CAAC;IAC7B,MAAM,iBAAiB,GAAa,EAAE,CAAC;IAEvC,KAAK,MAAM,IAAI,IAAI,MAAM,EAAE,CAAC;QAC1B,MAAM,QAAQ,GAAG,aAAa,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC;QAElD,IAAI,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,cAAc,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC,CAAC,CAAC;YAE9E,+DAA+D;YAC/D,MAAM,WAAW,GAAG,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,IAAI,CAAC,IAAK,CAAC,wBAAyB,CAAC,CAAC,CAAC;YACzF,MAAM,WAAW,GAAG,WAAW,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC,IAAS,EAAE,EAAE,CAC5D,IAAI,CAAC,MAAM,KAAK,OAAO;gBACvB,IAAI,CAAC,SAAS,EAAE,OAAO,KAAK,yBAAyB;gBACrD,CAAC,IAAI,CAAC,MAAM,KAAK,gBAAgB,IAAI,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,gBAAgB,CAAC,CAAC,CAC9E,CAAC;YAEF,IAAI,CAAC,WAAW,EAAE,CAAC;gBACjB,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;gBACjC,OAAO,CAAC,GAAG,CAAC,mBAAmB,QAAQ,kCAAkC,CAAC,CAAC;YAC7E,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,UAAU,QAAQ,EAAE,CAAC,CAAC;YACpC,CAAC;QACH,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,IAAI,GAAG,CAAC,IAAI,KAAK,uBAAuB,EAAE,CAAC;gBACzC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;gBACvB,OAAO,CAAC,GAAG,CAAC,eAAe,QAAQ,EAAE,CAAC,CAAC;YACzC,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,aAAa,QAAQ,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACvD,CAAC;QACH,CAAC;IACH,CAAC;IAED,IAAI,OAAO,CAAC,MAAM,GAAG,CAAC,IAAI,iBAAiB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QACvD,OAAO,CAAC,GAAG,CAAC,4DAA4D,CAAC,CAAC;QAE1E,IAAI,OAAO,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,KAAK,OAAO,CAAC,MAAM,gCAAgC,CAAC,CAAC;YACjE,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC,OAAO,CAAC,GAAG,CAAC,OAAO,IAAI,EAAE,CAAC,CAAC,CAAC;YACpD,OAAO,CAAC,GAAG,CAAC,kEAAkE,CAAC,CAAC;QAClF,CAAC;QAED,IAAI,iBAAiB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,KAAK,iBAAiB,CAAC,MAAM,6CAA6C,CAAC,CAAC;YACxF,iBAAiB,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC,OAAO,CAAC,GAAG,CAAC,OAAO,IAAI,EAAE,CAAC,CAAC,CAAC;YAC9D,OAAO,CAAC,GAAG,CAAC,mEAAmE,CAAC,CAAC;YACjF,OAAO,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;YACzC,OAAO,CAAC,GAAG,CAAC,mGAAmG,CAAC,CAAC;QACnH,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,mDAAmD,CAAC,CAAC;QACjE,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,SAAS,CAAC;YACzB,OAAO,EAAE,YAAY;YACrB,SAAS,EAAE,CAAC;oBACV,MAAM,EAAE,OAAO;oBACf,SAAS,EAAE,EAAE,OAAO,EAAE,yBAAyB,EAAE;oBACjD,MAAM,EAAE,gBAAgB;iBACzB,CAAC;SACH,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QAEb,OAAO,CAAC,GAAG,CAAC,4DAA4D,CAAC,CAAC;QAC1E,OAAO,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;QAEhC,+DAA+D;QAC/D,MAAM,IAAI,kBAAkB,CAAC,GAAG,OAAO,CAAC,MAAM,GAAG,iBAAiB,CAAC,MAAM,iHAAiH,CAAC,CAAC;IAC9L,CAAC;SAAM,CAAC;QACN,OAAO,CAAC,GAAG,CAAC,OAAO,MAAM,CAAC,MAAM,0DAA0D,CAAC,CAAC;IAC9F,CAAC;AACH,CAAC;AAED,KAAK,UAAU,qBAAqB,CAAC,SAAiB,EAAE,UAAkB;IACxE,MAAM,QAAQ,GAAG,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,CAAC;IAC7C,IAAI,CAAC,QAAQ;QAAE,OAAO;IAEtB,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IACvD,MAAM,MAAM,GAAG,IAAI,CAAC,SAAS,CAAC;QAC5B,OAAO,EAAE,YAAY;QACrB,SAAS,EAAE,CAAC;gBACV,GAAG,EAAE,+BAA+B;gBACpC,MAAM,EAAE,OAAO;gBACf,SAAS,EAAE,EAAE,OAAO,EAAE,sBAAsB,EAAE;gBAC9C,MAAM,EAAE;oBACN,mBAAmB;oBACnB,4BAA4B;iBAC7B;aACF,CAAC;KACH,CAAC,CAAC;IAEH,IAAI,CAAC;QACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,0BAA0B,CAAC;YAClD,cAAc,EAAE,QAAQ;YACxB,UAAU,EAAE,MAAM;SACnB,CAAC,CAAC,CAAC;QACJ,OAAO,CAAC,GAAG,CAAC,mDAAmD,CAAC,CAAC;IACnE,CAAC;IAAC,OAAO,GAAQ,EAAE,CAAC;QAClB,OAAO,CAAC,GAAG,CAAC,4DAA4D,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;IACzF,CAAC;AACH,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,oBAAoB,CAAC,WAAmB,EAAE,KAAkB;IAChF,MAAM,EAAE,SAAS,EAAE,aAAa,EAAE,eAAe,EAAE,GAAG,KAAK,CAAC;IAC5D,IAAI,CAAC,SAAS,IAAI,CAAC,aAAa;QAAE,OAAO;IAEzC,MAAM,YAAY,GAAG,eAAe,IAAI,aAAa,CAAC,qBAAqB,CAAC;IAC5E,MAAM,YAAY,GAAG,aAAa,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC;IAC/D,IAAI,CAAC,YAAY;QAAE,OAAO;IAC1B,MAAM,SAAS,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;IAElC,MAAM,YAAY,GAAG,gBAAgB,CAAC,WAAW,CAAC,CAAC;IACnD,MAAM,MAAM,GAAG,cAAc,CAAC,WAAW,CAAC,CAAC;IAC3C,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IAEvD,0BAA0B;IAC1B,MAAM,WAAW,GAAG,IAAI,CAAC,SAAS,CAAC;QACjC,OAAO,EAAE,YAAY;QACrB,SAAS,EAAE,CAAC;gBACV,MAAM,EAAE,OAAO;gBACf,SAAS,EAAE,EAAE,OAAO,EAAE,sBAAsB,EAAE;gBAC9C,MAAM,EAAE,gBAAgB;aACzB,CAAC;KACH,CAAC,CAAC;IAEH,IAAI,OAAO,GAAG,CAAC,CAAC;IAChB,KAAK,MAAM,IAAI,IAAI,MAAM,EAAE,CAAC;QAC1B,MAAM,MAAM,GAAG,eAAe,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAClD,MAAM,gBAAgB,GAAG,MAAM,CAAC,OAAO,IAAI,YAAY,CAAC,KAAK,EAAE,OAAO,IAAI,GAAG,CAAC;QAE9E,gEAAgE;QAChE,IAAI,gBAAgB,GAAG,aAAa,CAAC,kBAAkB;YAAE,SAAS;QAElE,MAAM,QAAQ,GAAG,aAAa,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;QAEpD,cAAc;QACd,IAAI,CAAC;YACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,iBAAiB,CAAC;gBACzC,QAAQ,EAAE,QAAQ;gBAClB,wBAAwB,EAAE,WAAW;aACtC,CAAC,CAAC,CAAC;YACJ,OAAO,CAAC,GAAG,CAAC,0BAA0B,QAAQ,EAAE,CAAC,CAAC;YAClD,OAAO,EAAE,CAAC;QACZ,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,IAAI,GAAG,CAAC,IAAI,KAAK,8BAA8B,EAAE,CAAC;gBAChD,OAAO,CAAC,GAAG,CAAC,UAAU,QAAQ,EAAE,CAAC,CAAC;YACpC,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,aAAa,QAAQ,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBACrD,SAAS;YACX,CAAC;QACH,CAAC;QAED,kCAAkC;QAClC,MAAM,QAAQ,GAAG,CAAC,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,CAAC;QAClD,IAAI,MAAM,CAAC,KAAK,CAAC,QAAQ,KAAK,SAAS,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,uBAAuB,CAAC,EAAE,CAAC;YACvF,QAAQ,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC;QACzC,CAAC;QAED,MAAM,UAAU,GAAa,QAAQ,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE;YAChD,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;YACnD,OAAO,0BAA0B,SAAS,IAAI,SAAS,WAAW,YAAY,IAAI,IAAI,IAAI,QAAQ,IAAI,CAAC;QACzG,CAAC,CAAC,CAAC;QAEH,MAAM,MAAM,GAAG,IAAI,CAAC,SAAS,CAAC;YAC5B,OAAO,EAAE,YAAY;YACrB,SAAS,EAAE;gBACT;oBACE,MAAM,EAAE,OAAO;oBACf,MAAM,EAAE,+BAA+B;oBACvC,QAAQ,EAAE,UAAU;iBACrB;gBACD;oBACE,MAAM,EAAE,OAAO;oBACf,MAAM,EAAE;wBACN,qBAAqB;wBACrB,sBAAsB;wBACtB,mBAAmB;qBACpB;oBACD,QAAQ,EAAE,gBAAgB,SAAS,IAAI,SAAS,IAAI;iBACrD;gBACD;oBACE,MAAM,EAAE,OAAO;oBACf,MAAM,EAAE,2BAA2B;oBACnC,QAAQ,EAAE,GAAG;iBACd;gBACD;oBACE,MAAM,EAAE,OAAO;oBACf,MAAM,EAAE;wBACN,mBAAmB;wBACnB,4BAA4B;qBAC7B;oBACD,QAAQ,EAAE,eAAe,SAAS,IAAI,SAAS,eAAe;iBAC/D;aACF;SACF,CAAC,CAAC;QAEH,IAAI,CAAC;YACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,oBAAoB,CAAC;gBAC5C,QAAQ,EAAE,QAAQ;gBAClB,UAAU,EAAE,iBAAiB;gBAC7B,cAAc,EAAE,MAAM;aACvB,CAAC,CAAC,CAAC;QACN,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,OAAO,CAAC,GAAG,CAAC,sCAAsC,QAAQ,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;QAChF,CAAC;IACH,CAAC;IAED,IAAI,OAAO,GAAG,CAAC,EAAE,CAAC;QAChB,OAAO,CAAC,GAAG,CAAC,WAAW,OAAO,4BAA4B,CAAC,CAAC;IAC9D,CAAC;SAAM,CAAC;QACN,OAAO,CAAC,GAAG,CAAC,8BAA8B,CAAC,CAAC;IAC9C,CAAC;IAED,6DAA6D;IAC7D,MAAM,cAAc,GAAG,MAAM;SAC1B,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE;QACf,MAAM,MAAM,GAAG,eAAe,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAClD,MAAM,gBAAgB,GAAG,MAAM,CAAC,OAAO,IAAI,YAAY,CAAC,KAAK,EAAE,OAAO,IAAI,GAAG,CAAC;QAC9E,OAAO,gBAAgB,IAAI,aAAa,CAAC,kBAAkB,CAAC;IAC9D,CAAC,CAAC;SACD,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,gBAAgB,SAAS,SAAS,aAAa,CAAC,cAAc,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IAEzF,IAAI,cAAc,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QAC9B,MAAM,aAAa,CAAC,SAAS,EAAE,SAAS,EAAE,cAAc,EAAE,2BAA2B,CAAC,CAAC;IACzF,CAAC;AACH,CAAC"}
@@ -0,0 +1,9 @@
1
+ /**
2
+ * ECS-specific cloud setup logic.
3
+ *
4
+ * Extracted from cloud-setup.ts to keep the main orchestrator slim.
5
+ * Contains all AWS resource creation/discovery for ECS Fargate setup.
6
+ */
7
+ import type { CloudConfig } from "../../shared/config.js";
8
+ export declare function setupEcsCloud(cloud: CloudConfig): Promise<boolean>;
9
+ //# sourceMappingURL=cloud-setup-ecs.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cloud-setup-ecs.d.ts","sourceRoot":"","sources":["../../../src/cli/commands/cloud-setup-ecs.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAsCH,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,wBAAwB,CAAC;AAM1D,wBAAsB,aAAa,CAAC,KAAK,EAAE,WAAW,GAAG,OAAO,CAAC,OAAO,CAAC,CA2LxE"}